[Objective] To establish the traceability mechanism of agricultural products safety, and the application of promote domestic based software in the supervision area of agricultural products quality and safety. [Method]...[Objective] To establish the traceability mechanism of agricultural products safety, and the application of promote domestic based software in the supervision area of agricultural products quality and safety. [Method] Through the analysis on the circulation characteristics of agricultural products, like fruits, vegetables, livestock and poultry, the agricultural products quality safety management and traceability query business component libraries were designed. Based on the run-time-supporting environment provided by domestic based software, traceability management system of agricultural products quality and safety was constructed. [Result] The traceability management system provided the information interaction and comprehensive management platform of agricultural product quality and safety based on domestic based software for the government, enterprises and consumers. [Conclusion] Through the application demonstration, the quality control and information traceability of full circulation of agricultural products was achieved effective and reliably, and the management level of agricultural products quality and safety was improved.展开更多
An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web mod...An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web model and controls the dynamic security of semantic web services, such as trust, logic and reasoning. It includes four layers, that is, a trust entrance layer, a social intelligence layer, a transaction layer, and a TCP/IP security protocols layer. The trust entrance layer deals with trustable features from users. Social intelligence layer is responsible for logical questions for a semantic web. The transaction layer carries out transaction reasoning. And the TCP/IP security protocols layer ensures security communication. These layers can cooperate to build closed-security-ring with different security grades. The integrated security framework provides an integrated security method for semantic web flow so that it is universal for various semantic web technologies.展开更多
In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the pos...In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks.展开更多
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are in...Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks.展开更多
Objective To explore the safety and efficacy of frameless stereotactic brain biopsy.Methods Diagnostic accuracy was calculated by comparing biopsy diagnosis with definitive pathology in 62 patients who underwent frame...Objective To explore the safety and efficacy of frameless stereotactic brain biopsy.Methods Diagnostic accuracy was calculated by comparing biopsy diagnosis with definitive pathology in 62 patients who underwent frameless stereotactic brain biopsy between January 2008 and December 2010 in Xiamen University Southeast Hospital.Preoperative characteristics and histological diagnosis were reviewed and then information was analysed to identify factors associated with the biopsy not yielding a diagnosis and complications.Results Diagnostic yield was 93.5%.No differences were found between pathological diagnosis and frozen pathological diagnosis.The most common lesions were astrocytic lesions,included 16 cases of low-grade glioma and 12 cases of malignant glioma.Remote hemorrhage,metastasis,and lymphoma were following in incidence.Multiple brain lesions were found in 17 cases (27.4%).Eleven cases were frontal lesions (17.7%),8 were frontotemporal (12.9%),6 were frontoparietal (9.7%),and 5 each were temporal,parietal,and parietotemporal lesions (8.1%).Postoperative complications occurred in 21.0% of the patients after biopsies,including 10 haemorrhages (16.1%) and 3 temporary neurological deficits (1 epilepsy,1 headache,and 1 partial hemiparesis).No patient required operation for hematoma evacuation.Conclusion Frameless stereotactic biopsy is an effective and safe technique for histologic diagnosis of brain lesions,particularly for multifocal and frontal lesions.展开更多
We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We inves...We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We investigate the computational security of the proposed ciphers against chosen-plaintext-chosen-initialization-vector attacks and show that it is based on the hardness of solving some systems of random nonlinear Boolean equations. We also provide guidelines for choosing components to design randomizers for specified ciphers.展开更多
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou...The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.展开更多
The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarante...The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarantees that can be necessary for flow of legal documents. Mediated signatures have been proposed as a mechanism to effectively disable signature cards. In this paper we propose further mechanisms that can be applied on top of mediated RSA, compatible with the standard format, but providing security guarantees even in the case when RSA becomes broken or the keys are compromised. The solution is immune tokleptographic attacks as only deterministic algorithms are used on user's side.展开更多
The concept of sustainable development has experienced great development and change at different levels of theoretical connotation and practical implementation since 1960 s and 1970 s when it was first proposed. Peopl...The concept of sustainable development has experienced great development and change at different levels of theoretical connotation and practical implementation since 1960 s and 1970 s when it was first proposed. People's understanding of the relationship between economy,society, and environment has been continuously deepened over the years. When it came to the end of 2015, it is necessary to examine the results of the United Nations Millennium Development Goals on sustainable development, and at the same time, the post-2015 framework and guidance on sustainable development at the global level were to be made, including the ideas, action plans, key areas that would guide the global sustainable development. The 2030 Agenda for Sustainable Development has developed a 5P theoretical framework of being peoplecentered, global environmental security, sustained economic prosperity, social justice and harmony and partnership promotion, including a political declaration, 17 overarching goals and 169 specific targets, specific ways of implementation, as well as the follow-up. It is the road map to achieve global sustainable development and meet the requirements of the millennium development goals. This paper summarizes the understanding of the concept of sustainable development from its origin, its significant development, to the proposition and development of the 2030 Agenda for Sustainable Development, and its strategic impact on China.展开更多
The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability sol...The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability solutions for financial services. The interpretation of case data with actor network theory (ANT) provides an illustration of power coalitions among banks to create a de facto standard for transnational electronic payment security on the Internet. After a step of protecting its political interests and well-known technological solutions, the coalition understands that its mission becomes a matter of life and death for its members: Brand-new currency has been invented on the Web and one could develop business and monetary transactions without the banks. This interpretative stage tells us much about the transnational mechanisms of regulation and standardization as well as the "translation" steps regarding these transnational organizations. However, an additional step has to be added to this interpretative step, a step of framework construction. The aim is to help managers of the transnational firms involved in regulations and standardization to anticipate the evolutions and make relevant decisions. The framework has three distinctive characteristics: the ability to help conception, the ability to help conceive problems "ex ante", and the ability to facilitate collective conception of strategic maneuvers.展开更多
This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of ...This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of explicit and tacit knowledge in the field of vocational occupational safety and health (OSH) training. This project identifies three specific research steps for the development of the knowledge management framework of the information technology-based approach for improving occupational safety training of young workers, including: (1) the development of the conceptual model of the flow of explicit knowledge of OSH; (2) evaluation of the effectiveness of formal and explicit knowledge sources for OSH and training methods using these sources in the context of attitudes towards health and safety at work; and (3) verification of the proposed model of vocational training with the use of combined explicit and hidden knowledge. The proposed framework includes consideration of the effectiveness of the formal and informal sources of safety knowledge. A mapping from the formal sources of explicit knowledge about the occupational safety to expected attitudes (hidden knowledge) towards OSH outcomes, including emotional, cognitive, and behavioral aspects has been used. The above framework should help to improve the system of vocational training for young workers in Poland.展开更多
This paper presents a conceptual framework of integrated waste management which focuses on all stages of product life cycle. A mechanism of resource recovery motivating from waste in economic system (designers, produ...This paper presents a conceptual framework of integrated waste management which focuses on all stages of product life cycle. A mechanism of resource recovery motivating from waste in economic system (designers, producers, consumers, stakeholders in the field of disposal of the product) is suggested. The classification of institutional and economic instruments in the field of waste management as recoverable resources is developed. The author has proposed a scientific and methodical approach to the formation of an integrated waste management as recoverable resources, which is based on a set of methods of economic incentives at all stages of product life cycle and ensures the maximum possible and the environmentally safe management of wastes containing valuable resource components.展开更多
Based on the basic selection criteria of Globally Important Agricultural Heritage Systems(GIAHS)and food and livelihood security research trends,this paper established an evaluation framework and indicator system for ...Based on the basic selection criteria of Globally Important Agricultural Heritage Systems(GIAHS)and food and livelihood security research trends,this paper established an evaluation framework and indicator system for food and livelihood security in GIAHS and selected the first GIAHS site in the Qinghai-Tibet Plateau as a case for empirical evaluation.The results demonstrate that the food and livelihood security of farmers at this site was at a medium level,with an average evaluation value of 2.91,which still lagged behind the level of better food and livelihood security.Specifically,the average values of farmers’evaluation of food security and livelihood security were 1.43 and 1.48,respectively,which show that farmers’food security in the study area was at a medium level and that of livelihood security was relatively good.Simultaneously,the more simple a farmers’economic activities(i.e.,agriculture-oriented economic activities or non-agriculture-oriented economic activities),the worse their food and livelihood security;while the more diversified the economic activities(i.e.,engaged in part-time economic activities),the better the food and livelihood security.展开更多
This paper establishes a new framework for modeling electrical cyber-physical systems(ECPSs),integrating both power grids and communication networks. To model the communication network associated with a power transmis...This paper establishes a new framework for modeling electrical cyber-physical systems(ECPSs),integrating both power grids and communication networks. To model the communication network associated with a power transmission grid, we use a mesh network that considers the features of power transmission grids such as high-voltage levels, long-transmission distances, and equal importance of each node. Moreover, bidirectional links including data uploading channels and command downloading channels are assumed to connect every node in the communication network and a corresponding physical node in the transmission grid. Based on this model,the fragility of an ECPS is analyzed under various cyber attacks including denial-of-service(Do S) attacks, replay attacks, and false data injection attacks. Control strategies such as load shedding and relay protection are also verified using this model against these attacks.展开更多
基金Supported by Common Chips and Basic Software Products(2010ZX01045-001-004-3)~~
文摘[Objective] To establish the traceability mechanism of agricultural products safety, and the application of promote domestic based software in the supervision area of agricultural products quality and safety. [Method] Through the analysis on the circulation characteristics of agricultural products, like fruits, vegetables, livestock and poultry, the agricultural products quality safety management and traceability query business component libraries were designed. Based on the run-time-supporting environment provided by domestic based software, traceability management system of agricultural products quality and safety was constructed. [Result] The traceability management system provided the information interaction and comprehensive management platform of agricultural product quality and safety based on domestic based software for the government, enterprises and consumers. [Conclusion] Through the application demonstration, the quality control and information traceability of full circulation of agricultural products was achieved effective and reliably, and the management level of agricultural products quality and safety was improved.
基金The National Natural Science Foundation of China(No.60474037),Program for New Century Excellent Talents in Univer-sity (No.NCET-04-415).
文摘An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web model and controls the dynamic security of semantic web services, such as trust, logic and reasoning. It includes four layers, that is, a trust entrance layer, a social intelligence layer, a transaction layer, and a TCP/IP security protocols layer. The trust entrance layer deals with trustable features from users. Social intelligence layer is responsible for logical questions for a semantic web. The transaction layer carries out transaction reasoning. And the TCP/IP security protocols layer ensures security communication. These layers can cooperate to build closed-security-ring with different security grades. The integrated security framework provides an integrated security method for semantic web flow so that it is universal for various semantic web technologies.
基金This work was supported by the Program for Changjiang Scholars and Innovative Research Team in University under Grant No. IRT1078 the Key Program of NSFC-Guangdong Union Foundation under Grant No.U1135002+3 种基金 the Major National S&T Program under Grant No.2011ZX03005-002 the National Natural Science Foundation of China under Grants No. 61072066, No.61173135, No.61100230, No.61100233, No.61202389, No.61202390 the Natural Science Basic Research Plan in Shaanxi Province of China under Grants No.2012JQ8043, No. 2012JM8030, No. 2012JM8025, No2011JQ8003 the Fundamental Research Funds for the Central Universities under Cxants No. JY10000903001, No. K50511030004. The authors would like to thank the anonymous reviewers and the editor for their constructive comments that have helped us to improve this paper.
文摘In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks.
基金supported by Natural Science Foundation of China under award No.61303024Natural Science Foundation of Jiangsu Province under award No.BK20130372+3 种基金National 973 Program of China under award No.2014CB340600National High Tech 863 Program of China under award No.2015AA016002supported by Natural Science Foundation of China under award No.61272452supported in part by ARO Grant # W911NF-12-1-0286 and NSF Grant #1111925
文摘Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks.
文摘Objective To explore the safety and efficacy of frameless stereotactic brain biopsy.Methods Diagnostic accuracy was calculated by comparing biopsy diagnosis with definitive pathology in 62 patients who underwent frameless stereotactic brain biopsy between January 2008 and December 2010 in Xiamen University Southeast Hospital.Preoperative characteristics and histological diagnosis were reviewed and then information was analysed to identify factors associated with the biopsy not yielding a diagnosis and complications.Results Diagnostic yield was 93.5%.No differences were found between pathological diagnosis and frozen pathological diagnosis.The most common lesions were astrocytic lesions,included 16 cases of low-grade glioma and 12 cases of malignant glioma.Remote hemorrhage,metastasis,and lymphoma were following in incidence.Multiple brain lesions were found in 17 cases (27.4%).Eleven cases were frontal lesions (17.7%),8 were frontotemporal (12.9%),6 were frontoparietal (9.7%),and 5 each were temporal,parietal,and parietotemporal lesions (8.1%).Postoperative complications occurred in 21.0% of the patients after biopsies,including 10 haemorrhages (16.1%) and 3 temporary neurological deficits (1 epilepsy,1 headache,and 1 partial hemiparesis).No patient required operation for hematoma evacuation.Conclusion Frameless stereotactic biopsy is an effective and safe technique for histologic diagnosis of brain lesions,particularly for multifocal and frontal lesions.
文摘We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We investigate the computational security of the proposed ciphers against chosen-plaintext-chosen-initialization-vector attacks and show that it is based on the hardness of solving some systems of random nonlinear Boolean equations. We also provide guidelines for choosing components to design randomizers for specified ciphers.
基金supported in part by the following grants:National Science Foundation of China(Grant No.61272400)Chongqing Innovative Team Fund for College Development Project(Grant No.KJTD201310)+3 种基金Chongqing Youth Innovative Talent Project(Grant No.cstc2013kjrc-qnrc40004)Science and Technology Research Program of the Chongqing Municipal Education Committee(Grant No.KJ1500425)Foundation of CQUPT(Grant No.WF201403)Chongqing Graduate Research and Innovation Project(Grant No.CYS14146)
文摘The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.
文摘The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarantees that can be necessary for flow of legal documents. Mediated signatures have been proposed as a mechanism to effectively disable signature cards. In this paper we propose further mechanisms that can be applied on top of mediated RSA, compatible with the standard format, but providing security guarantees even in the case when RSA becomes broken or the keys are compromised. The solution is immune tokleptographic attacks as only deterministic algorithms are used on user's side.
基金supported by Science Foundation of Hebei Province(Grant Number:D2016501095),Study on Environmental Effects of Carbon Emission Reduction and Carbon Market in Hebei Province based on Scenario AnalysisScientific Research Foundation of Northeastern University at Qinhuangdao,2016Humanities and Social Science Key Project(Grant Number:XNR201602),Study on the Market Mechanism of Carbon Emissions Trading in Hebei:Total Amount Allocation,Distribution Plan and Roadmap
文摘The concept of sustainable development has experienced great development and change at different levels of theoretical connotation and practical implementation since 1960 s and 1970 s when it was first proposed. People's understanding of the relationship between economy,society, and environment has been continuously deepened over the years. When it came to the end of 2015, it is necessary to examine the results of the United Nations Millennium Development Goals on sustainable development, and at the same time, the post-2015 framework and guidance on sustainable development at the global level were to be made, including the ideas, action plans, key areas that would guide the global sustainable development. The 2030 Agenda for Sustainable Development has developed a 5P theoretical framework of being peoplecentered, global environmental security, sustained economic prosperity, social justice and harmony and partnership promotion, including a political declaration, 17 overarching goals and 169 specific targets, specific ways of implementation, as well as the follow-up. It is the road map to achieve global sustainable development and meet the requirements of the millennium development goals. This paper summarizes the understanding of the concept of sustainable development from its origin, its significant development, to the proposition and development of the 2030 Agenda for Sustainable Development, and its strategic impact on China.
文摘The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability solutions for financial services. The interpretation of case data with actor network theory (ANT) provides an illustration of power coalitions among banks to create a de facto standard for transnational electronic payment security on the Internet. After a step of protecting its political interests and well-known technological solutions, the coalition understands that its mission becomes a matter of life and death for its members: Brand-new currency has been invented on the Web and one could develop business and monetary transactions without the banks. This interpretative stage tells us much about the transnational mechanisms of regulation and standardization as well as the "translation" steps regarding these transnational organizations. However, an additional step has to be added to this interpretative step, a step of framework construction. The aim is to help managers of the transnational firms involved in regulations and standardization to anticipate the evolutions and make relevant decisions. The framework has three distinctive characteristics: the ability to help conception, the ability to help conceive problems "ex ante", and the ability to facilitate collective conception of strategic maneuvers.
文摘This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of explicit and tacit knowledge in the field of vocational occupational safety and health (OSH) training. This project identifies three specific research steps for the development of the knowledge management framework of the information technology-based approach for improving occupational safety training of young workers, including: (1) the development of the conceptual model of the flow of explicit knowledge of OSH; (2) evaluation of the effectiveness of formal and explicit knowledge sources for OSH and training methods using these sources in the context of attitudes towards health and safety at work; and (3) verification of the proposed model of vocational training with the use of combined explicit and hidden knowledge. The proposed framework includes consideration of the effectiveness of the formal and informal sources of safety knowledge. A mapping from the formal sources of explicit knowledge about the occupational safety to expected attitudes (hidden knowledge) towards OSH outcomes, including emotional, cognitive, and behavioral aspects has been used. The above framework should help to improve the system of vocational training for young workers in Poland.
文摘This paper presents a conceptual framework of integrated waste management which focuses on all stages of product life cycle. A mechanism of resource recovery motivating from waste in economic system (designers, producers, consumers, stakeholders in the field of disposal of the product) is suggested. The classification of institutional and economic instruments in the field of waste management as recoverable resources is developed. The author has proposed a scientific and methodical approach to the formation of an integrated waste management as recoverable resources, which is based on a set of methods of economic incentives at all stages of product life cycle and ensures the maximum possible and the environmentally safe management of wastes containing valuable resource components.
基金The National Natural Science Foundation of China (42001249)。
文摘Based on the basic selection criteria of Globally Important Agricultural Heritage Systems(GIAHS)and food and livelihood security research trends,this paper established an evaluation framework and indicator system for food and livelihood security in GIAHS and selected the first GIAHS site in the Qinghai-Tibet Plateau as a case for empirical evaluation.The results demonstrate that the food and livelihood security of farmers at this site was at a medium level,with an average evaluation value of 2.91,which still lagged behind the level of better food and livelihood security.Specifically,the average values of farmers’evaluation of food security and livelihood security were 1.43 and 1.48,respectively,which show that farmers’food security in the study area was at a medium level and that of livelihood security was relatively good.Simultaneously,the more simple a farmers’economic activities(i.e.,agriculture-oriented economic activities or non-agriculture-oriented economic activities),the worse their food and livelihood security;while the more diversified the economic activities(i.e.,engaged in part-time economic activities),the better the food and livelihood security.
基金Project supported by the National Basic Research Program(863)of China(No.2015AA05002)the National Natural Science Foundation of China(No.61471328)the Science and Technology Project of State Grid,China(No.XXB17201400056)
文摘This paper establishes a new framework for modeling electrical cyber-physical systems(ECPSs),integrating both power grids and communication networks. To model the communication network associated with a power transmission grid, we use a mesh network that considers the features of power transmission grids such as high-voltage levels, long-transmission distances, and equal importance of each node. Moreover, bidirectional links including data uploading channels and command downloading channels are assumed to connect every node in the communication network and a corresponding physical node in the transmission grid. Based on this model,the fragility of an ECPS is analyzed under various cyber attacks including denial-of-service(Do S) attacks, replay attacks, and false data injection attacks. Control strategies such as load shedding and relay protection are also verified using this model against these attacks.